Providing security to ensure you are protected and worry free.

Assura started in 2007 with one mission – to make cybersecurity available for everyone and not just the big companies with big budgets. We believe security is a right and not a privilege and people deserve to have their sensitive data and systems protected.  We defend our clients from attackers by helping maintain a safe and secure technology environment.

Over the years, Assura has become an expert in the complicated world of cybersecurity protections and government-related regulations. We leverage our expertise to make sure your cybersecurity withstands the toughest scrutiny from auditors, regulators, and plaintiff’s attorneys. Innovations such as Our Guarantee provide our clients with the information and the peace of mind they need to make informed decisions that produce improved business results.

Our staff of cybersecurity experts are dedicated to ensuring your organization is secure. Learn more about our team here.

Our Vision and Values

Our vision is to safeguard the future, one client at a time. We believe people have a right to live without fear, to have their data protected, to keep what’s personal private, and that security is a right not a privilege.

Our Values

These five values serve as core principles for how we run our entire business at Assura. As the cybersecurity landscape continues to evolve and change, we promise these values will remain.

Walk the Talk

Actions speak louder than words. All Assura employees share and uphold the responsibility of bringing our values to life. We can actually do everything we say.

Own the Outcome

Just because the project is over doesn’t mean our commitment to clients stops. If our work for you is ever audited, we’ll own the outcome and defend our work for free. If we have made a mistake, we fix it for free. Our guarantee is no joke.

Sweat the Details

People say “don’t sweat the details” but for us, details are the difference between mediocre and exceptional service. Providing exceptional service requires exceeding clients expectations every single time. Our employees will make sure that we not only meet but exceed your expectations.

Eat Our Own Dog Food

We use the products we represent and follow the same advice we give our clients. We’re confident in what we do because we know from experience that our security solutions and products work.

No A-Holes Allowed

We won’t hire them and we won’t act like them. Our values truly guide what we do and how we serve. So if someone at Assura breaks these values, they’re a straight-up a-hole and that’s not tolerated.

Assura’s Guarantee

Assura won’t abandon you at your time of need.

Dedication to our clients is one of our core values. Just because a project is completed doesn’t mean our commitment to support your organization’s security comes to an end.

In the rare event that you are audited because of one of our deliverables, Assura has you covered. Our Guarantee means that we defend the deliverables at no additional cost. Yes, we’re serious. And yes, we’re that confident in the quality of our work. Assura will work with the auditor to remediate the issue until it’s been resolved. On the off chance that a change needs to be made to the deliverable, we’ll do that for free too. It’s that simple.

Our Guarantee is included with all Assura deliverables for our clients. Check out the cyber security services we offer here.

The Faces You’ve Been Waiting For

Our Leadership Team

Karen L. Cole

Co-Founder and Chief Executive Officer

Although Karen grew up on a farm in Virginia, her family nicknamed her, “the black thumb of death” when it comes to plant life. So obviously that lead to a career in IT, not horticulture. She was a cybersecurity practitioner long before it was cool. Many call her a unicorn because she's a real, live female cybersecurity CEO who paid her dues in the industry. That’s why Karen is passionate about grooming the next generation of security professionals. When not running Assura, she bakes cookies and banana bread that would make Gordon Ramsay weep with joy, and spends time with her 2 kids and some guy with a goatee.

Joshua A. Cole

Co-Founder and Chief Technology Officer

Josh was one of those kids in high school who was staring at a computer monitor rather than having a social life. Fortunately, he parlayed all that time sequestered from humanity, hopped up on Mountain Dew and Funyuns, into an IT career that started at 17-years-old. In 1996, Josh shifted his career focus to cybersecurity because of his crush on Sandra Bullock in the movie “The Net”. These days, Josh spends his time teaching people how to fight bad guy hackers, flying airplanes, and spending time with his wife (the CEO of some company) and 2 kids.

John Brightly

Vice President of Service Delivery

When not contemplating the selection and tailoring of appropriate information security controls for our valued clients, John spends as much time as possible spoiling his 6 grandchildren (who are all obviously fluent IT users). John can always be counted on to put a smile on your face, whether it’s pranking the CEO of Assura, turning the tables on determined hackers, or promoting an office “sleep study” when the boss is away. (He’s kidding, Karen.)

Tracy Davenport

Project Management

Our Project Management leader knows all, sees all, and is ahead of the team before they know they are behind. Her nickname is Radar from the book, movie and TV show called M.A.S.H (Google it if you were born after 1972!) Tracy keeps projects moving so that we stay on time and on budget, which ensures that our clients remain happy.

Heyshia Tillman

Office Manager

Heyshia keeps our office running in many ways, but we gave her sainthood because she always makes sure we have heavy a supply of caffeine and chocolate. When she isn’t busy corralling employees and vendors, she participates in John’s office sleep study.

Proof We Know What We’re Talking About

Case Studies

Case Study: State Government

Combining recovery plans for Business Continuity and Information Security Programs

Case Study: Local Government, County

Working together to manage information security throughout all levels of government

Case Study: State Government

Finding all the sensitive data to protect before the hackers find it